Symmetric Encryption, Asymmetric Encryption, and HashingA fundamental topic of IT security that often gives people difficulty is understanding the difference between symmetric, asymmetric encryption, and hashing While each has specific uses, a robust communications encryption solution will typically implement all three Symmetric encryption algorithms

OpenSSL Command-Line HOWTO - madboa. comIntroduction The openssl command-line binary that ships with the OpenSSL libraries can perform a wide range of cryptographic operations It can come in handy in scripts or for accomplishing one-time command-line tasks

You Wouldnt Base64 a Password - Cryptography Decoded . . . There's a ton of bad programming and security advice on the Internet Some of the advice is bad because the author is misinformed, some because it emphasizes precision over clarity and most people wind up lost in the jargon If you feel that cryptography is a weird, complicated, and slightly

RC4 - WikipediaIn 2001, a new and surprising discovery was made by Fluhrer, Mantin and Shamir: over all possible RC4 keys, the statistics for the first few bytes of output keystream are strongly non-random, leaking information about the key